Sciweavers

98
Voted
ESORICS
1994
Springer
15 years 7 months ago
Beacon Based Authentication
Azad Jiwa, Jennifer Seberry, Yuliang Zheng
133
Voted
ESORICS
1994
Springer
15 years 7 months ago
The ESPRIT Project CAFE - High Security Digital Payment Systems
CAFE ("Conditional Access for Europe") is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for condit...
Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, ...
83
Voted
ESORICS
1994
Springer
15 years 7 months ago
Authentication via Multi-Service Tickets in the Kuperee Server
Thomas Hardjono, Jennifer Seberry
128
Voted
ESORICS
1994
Springer
15 years 7 months ago
Liability and Computer Security: Nine Principles
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about ...
Ross J. Anderson
98
Voted
CCS
1994
ACM
15 years 7 months ago
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms
Paul C. van Oorschot, Michael J. Wiener
144
Voted
CCS
1994
ACM
15 years 7 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche
112
Voted
CCS
1994
ACM
15 years 7 months ago
Endorsements, Licensing, and Insurance for Distributed System Services
Clients in a distributedsystem place their con dencein many servers, and servers themselves rely on other servers for le storage, authentication, authorization, and payment. When ...
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman
141
Voted
CCS
1994
ACM
15 years 7 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
105
Voted
CCS
1994
ACM
15 years 7 months ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash
103
Voted
CCS
1994
ACM
15 years 7 months ago
Protocol Failure in the Escrowed Encryption Standard
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Matt Blaze